Ethical Hacking: Hacking Wireless Networks
Wireless provides one of the biggest attack vectors for hackers. This course will teach you how to secure wireless networks needed for the CEH 312-50 exam.
What you'll learn
Wireless technologies have changed our world, but it’s also given hackers another attack vector . In this course, Ethical Hacking: Wireless Hacking, you’ll learn to look at your wireless infrastructures the way attackers do and what you can do to protect your organization using the skills of an Ethical Hacker. First, you’ll explore the concepts of wireless technologies, from transmission types to antenna types. Next, you’ll discover the threats and methodologies used by hackers to attack your networks. Finally, you’ll learn how to [protect your wireless infrastructures with countermeasures. When you’re finished with this course, you’ll have the skills and knowledge of ethical hacking needed for the CEH 312-50 exam.
Table of contents
- Step 1: Discovery 5m
- Demo: Finding WPS-enabled APs 4m
- Step 2: GPS Mapping 5m
- Step 3: Wireless Traffic Analysis 6m
- Demo: Using Your Phone and Wi-Fi Analyzer 2m
- Step 4: Launching an Attack 2m
- Demo: Finding Hidden SSIDs 2m
- Evil Twin Attacks 2m
- Demo: Evil Twins 9m
- Wi-Jacking Attack 2m
- Step 5: Cracking Encryption 2m
- Demo: Cracking WPA Using Aircrack-ng 10m
- Learning Check 2m